Chapter 11. Access Control Requirement Patterns

In this chapter:

11.1 User Registration Requirement Pattern 284

11.2 User Authentication Requirement Pattern 295

11.3 User Authorization Requirement Patterns 305

11.4 Specific Authorization Requirement Pattern 308

11.5 Configurable Authorization Requirement Pattern 313

11.6 Approval Requirement Pattern 318

Access control lets us nominate all the people we’re prepared to let in, check each one’s identity when they visit, limit their access to only what they should see and do, and see who did what—so we needn’t trust anyone more than we have to. These are essential features of almost every serious commercial system, and few do it well.

Figure 11-1. Requirement patterns in the access control domain

Access control ...

Get Software Requirement Patterns now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.